Syngress imprint: 289 books

Building an Information Security Awareness Program

Defending Against Social Engineering and Technical Threats

by Bill Gardner, Valerie Thomas
Language: English
Release Date: August 12, 2014

The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization's staff of the risk and educate them on how to protect your organization's data. Social engineering is not a new tactic, but Building an Security Awareness Program...

Protecting Patient Information

A Decision-Maker's Guide to Risk, Prevention, and Damage Control

by Paul Cerrato
Language: English
Release Date: April 14, 2016

Protecting Patient Information: A Decision-Maker's Guide to Risk, Prevention, and Damage Control provides the concrete steps needed to tighten the information security of any healthcare IT system and reduce the risk of exposing patient health information (PHI) to the public. The book offers a systematic,...

Job Reconnaissance

Using Hacking Skills to Win the Job Hunt Game

by Josh More
Language: English
Release Date: September 20, 2013

There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people's limiting factor in their ability to get better jobs is not technical skills or even the soft skills necessary to do well in a new job. It is that getting a job...
by Richard Li, Mac Ruiz, Mario Ferrari
Language: English
Release Date: April 18, 2011

The Ultimate Tool for MINDSTORMS® Maniacs The new MINDSTORMS kit has been updated to include a programming brick, USB cable, RJ11-like cables, motors, and sensors. This book updates the robotics information to be compatible with the new set and to show how sound, sight, touch, and distance issues...

Introduction to Information Security

A Strategic-Based Approach

by Timothy Shimeall, Jonathan Spring
Language: English
Release Date: November 12, 2013

Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide...
by
Language: English
Release Date: August 21, 2013

Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability...

The Basics of Digital Forensics

The Primer for Getting Started in Digital Forensics

by John Sammons
Language: English
Release Date: December 9, 2014

The Basics of Digital Forensics provides a foundation for people new to the digital forensics field. This book teaches you how to conduct examinations by discussing what digital forensics is, the methodologies used, key tactical concepts, and the tools needed to perform examinations. Details on digital...
by Tom St Denis
Language: English
Release Date: December 1, 2006

The only guide for software developers who must learn and implement cryptography safely and cost effectively. Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic...

Nmap in the Enterprise

Your Guide to Network Scanning

by Angela Orebaugh, Becky Pinkard
Language: English
Release Date: August 31, 2011

Nmap, or Network Mapper, is a free, open source tool that is available under the GNU General Public License as published by the Free Software Foundation. It is most often used by network administrators and IT security professionals to scan corporate networks, looking for live hosts, specific services,...
by Philip Polstra
Language: English
Release Date: September 2, 2014

Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile or more. Hacking...
by Jeremy Faircloth
Language: English
Release Date: August 25, 2011

Penetration Tester’s Open Source Toolkit, Third Edition, discusses the open source tools available to penetration testers, the ways to use them, and the situations in which they apply. Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy....
by Jelle Van Haaster, Rickey Gevers, Martijn Sprengers
Language: English
Release Date: June 13, 2016

Much as Che Guevara’s book Guerilla Warfare helped define and delineate a new type of warfare in the wake of the Cuban revolution in 1961, Cyber Guerilla will help define the new types of threats and fighters now appearing in the digital landscape. Cyber Guerilla provides valuable insight...

CSA Guide to Cloud Computing

Implementing Cloud Privacy and Security

by Raj Samani, Jim Reavis, Brian Honan
Language: English
Release Date: September 22, 2014

CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance (CSA). For many years the CSA has been at the forefront of research and analysis into the...

The Basics of Information Security

Understanding the Fundamentals of InfoSec in Theory and Practice

by Jason Andress
Language: English
Release Date: July 16, 2011

The Basics of Information Security provides fundamental knowledge of information security in both theoretical and practical aspects. This book is packed with key concepts of information security, such as confidentiality, integrity, and availability, as well as tips and additional resources for further...
First 8 9 10 11 12 13 1415 16 17 18 19 20 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy